期刊文献+
共找到903篇文章
< 1 2 46 >
每页显示 20 50 100
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
1
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
QTL-Seq Identifies Genomic Regions Associated with Resistance to Bipolaris oryzae and Their Association with Defense Related Enzyme Activity in Rice
2
作者 Jagjeet Singh LORE Sanjay KUMAR +4 位作者 Dharminder BHATIA Mandeep Singh HUNJAN Rishabh MAHESHWARI Dayananda Veeriah Patil Jyoti JAIN 《Rice science》 2026年第1期15-20,I0028-I0033,共12页
Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an ... Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes. 展开更多
关键词 bipolaris oryzae temporal spik RESISTANCE defense related enzymes bipolaris oryzaeis identify potential qtls resistant genetic sources quantitative trait loci
在线阅读 下载PDF
Prompt Injection Attacks on Large Language Models:A Survey of Attack Methods,Root Causes,and Defense Strategies
3
作者 Tongcheng Geng Zhiyuan Xu +1 位作者 Yubin Qu W.Eric Wong 《Computers, Materials & Continua》 2026年第4期134-185,共52页
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man... Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs. 展开更多
关键词 Prompt injection attacks large language models defense mechanisms security evaluation
在线阅读 下载PDF
Exogenous melatonin enhances heat stress tolerance in sweetpotato by modulating antioxidant defense system,osmotic homeostasis and stomatal traits 被引量:1
4
作者 Sunjeet Kumar Rui Yu +5 位作者 Yang Liu Yi Liu Mohammad Nauman Khan Yonghua Liu Mengzhao Wang Guopeng Zhu 《Horticultural Plant Journal》 2025年第1期431-445,共15页
Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairme... Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairments is essential for the long-term production of sweetpotatoes.Melatonin has been recognised for its capacity to assist plants in dealing with abiotic stress conditions.This research aimed to investigate how different doses of exogenous melatonin influence heat damage in sweetpotato plants.Heat stress drastically affected shoot and root fresh weight by 31.8 and 44.5%,respectively.This reduction resulted in oxidative stress characterised by increased formation of hydrogen peroxide(H_(2)O_(2))by 804.4%,superoxide ion(O_(2)^(·-))by 211.5%and malondialdehyde(MDA)by 234.2%.Heat stress also reduced chlorophyll concentration,photosystemⅡefficiency(F_v/F_m)by 15.3%and gaseous exchange.However,pre-treatment with 100μmol L^(-1)melatonin increased growth and reduced oxidative damage to sweetpotato plants under heat stress.In particular,melatonin decreased H_(2)O_(2),O_(2)^(·-)and MDA by 64.8%,42.7%and 38.2%,respectively.Melatonin also mitigated the decline in chlorophyll levels and improved stomatal traits,gaseous exchange and F_(v)/F_(m)(13%).Results suggested that the favorable outcomes of melatonin treatment can be associated with elevated antioxidant enzyme activity and an increase in non-enzymatic antioxidants and osmo-protectants.Overall,these findings indicate that exogenous melatonin can improve heat stress tolerance in sweetpotatoes.This stu dy will assist re searchers in further investigating how melatonin makes sweetpotatoes more resistant to heat stress. 展开更多
关键词 SWEETPOTATO Heat stress MELATONIN Oxidative damage Antioxidant defense system Stomatal traits
在线阅读 下载PDF
Finding the balance: Modifying the cholesterol and steroidal glycoalkaloid synthesis pathway in tomato(Solanum lycopersicum L.) for human health, fruit flavor, and plant defense
5
作者 Vincenzo Averello IV Adrian D.Hegeman Changbin Chen 《Horticultural Plant Journal》 2025年第1期42-56,共15页
Unlike most plants, members of the genus Solanum produce cholesterol and use this as a precursor for steroidal glycoalkaloids. The production of the compounds begins as a branch from brassinosteroid biosynthesis, whic... Unlike most plants, members of the genus Solanum produce cholesterol and use this as a precursor for steroidal glycoalkaloids. The production of the compounds begins as a branch from brassinosteroid biosynthesis, which produces cholesterol that is further modified to produce steroidal glycoalkaloids. During the cholesterol biosynthesis pathway, genetic engineering could alter the formation of cholesterol from provitamin D3(7-dehydrocholesterol) and produce vitamin D3. Cholesterol is a precursor for many steroidal glycoalkaloids, including a-tomatine and esculeoside A. Alpha-tomatine is consumed by mammals and it can reduce cholesterol content and improve LDL:HDL ratio. When there is a high a-tomatine content, the fruit will have a bitter flavor, which together with other steroidal glycoalkaloids serving as protective and defensive compounds for tomato against insect, fungal, and bacterial pests. These compounds also affect the rhizosphere bacteria by recruiting beneficial bacteria. One of the steroidal glycoalkaloids, esculeoside A increases while fruit ripening. This review focuses on recent studies that uncovered key reactions of the production of cholesterol and steroidal glycoalkaloids in tomato connecting to human health, fruit flavor, and plant defense and the potential application for tomato crop improvement. 展开更多
关键词 CHOLESTEROL Steroidal glycoalkaloids TOMATO Biosynthesis a-tomatine STEROLS TERPENOIDS Plant defense
在线阅读 下载PDF
ZmMYC2,selected during modern breeding,orchestrates growth and defense gene expression in maize
6
作者 Shuai Ma Xiangyu Lu +11 位作者 Bo Zhou Jiameng Zhu Qianhe Zhang Suzhen Li Xiaoqing Liu Wenzhu Yang Chunhui Li Yongxiang Li Yu Li Rumei Chen# Xiaojin Zhou Tianyu Wang 《Journal of Integrative Agriculture》 2025年第7期2876-2880,共5页
Highlights ZmMYC2 promoter contains favorable haplotypes selected during domestication,enhancing its expression level in modern maize.ZmMYC2 may balance the trade-off between growth and defense via jasmonate and auxin... Highlights ZmMYC2 promoter contains favorable haplotypes selected during domestication,enhancing its expression level in modern maize.ZmMYC2 may balance the trade-off between growth and defense via jasmonate and auxin signaling pathways.ZmMYC2 regulates drought-response genes(CER2 and TIP3c)to optimize drought stress resilience. 展开更多
关键词 JASMONATE AUXIN GROWTH PROMOTER optimize drought stress resilience jasmonate auxin signaling pathwayszmmyc defense zmmyc
在线阅读 下载PDF
Changes in induced-antipredation defense traits and transcriptome regulation of rotifer Brachionus calyciflorus in response to nanoplastics
7
作者 Huanhuan XU Xiaodan NAN +6 位作者 Yingying GE Yuxiang ZHOU Chunting ZHOU Kangning LIU Zhenzhen LI Man ZHANG Jiaxin YANG 《Journal of Oceanology and Limnology》 2025年第6期1877-1891,共15页
Nanoplastics(less than 1µm in size,NPs)have emerged as a significant pollutant in aquatic environment,posing considerable threats to freshwater biota.However,the mechanisms through which NPs modulate the predatio... Nanoplastics(less than 1µm in size,NPs)have emerged as a significant pollutant in aquatic environment,posing considerable threats to freshwater biota.However,the mechanisms through which NPs modulate the predation responses of these organisms remain poorly elucidated.We investigated the impacts of polystyrene NPs,characterized by a representative particle size(diameter:50 nm;concentration:0–8μg/L),on the anti-predation defense mechanisms of mature rotifer Brachionus calyciflorus against predator of rotifer Asplanchna brightwellii,utilizing transcriptomics to unravel the underlying molecular pathways.Results reveal that the posterolateral spine length and type of B.calyciflorus serve as robust indicators of defensive morphology,even in the presence of NPs exposure.Specifically,increasing concentrations of NPs and predator cues suppressed the defensive responses,which was associated with morphological transformations.This suppression was associated with the down-regulation of the HIF-1αsignaling pathway,implicating potentially its role in modulating fight-or-flight responses.Furthermore,we identified functional crosstalk among multiple signaling pathways,including HIF-1α,PI3K-Akt,FoxO,and mTOR,in B.calyciflorus,which may underpin the organism's responses to polystyrene NP exposure.These findings contribute to the advancement of predictive models to assess the ecological risks posed by polystyrene NPs contamination in aquatic ecosystems. 展开更多
关键词 ROTIFER Brachionus calyciflorus inducible defense Asplanchna kairomones nanoplastic TRANSCRIPTOME
在线阅读 下载PDF
A Dynamic Deceptive Defense Framework for Zero-Day Attacks in IIoT:Integrating Stackelberg Game and Multi-Agent Distributed Deep Deterministic Policy Gradient
8
作者 Shigen Shen Xiaojun Ji Yimeng Liu 《Computers, Materials & Continua》 2025年第11期3997-4021,共25页
The Industrial Internet of Things(IIoT)is increasingly vulnerable to sophisticated cyber threats,particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures.To address th... The Industrial Internet of Things(IIoT)is increasingly vulnerable to sophisticated cyber threats,particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures.To address this critical challenge,this paper proposes a dynamic defense framework named Zero-day-aware Stackelberg Game-based Multi-Agent Distributed Deep Deterministic Policy Gradient(ZSG-MAD3PG).The framework integrates Stackelberg game modeling with the Multi-Agent Distributed Deep Deterministic Policy Gradient(MAD3PG)algorithm and incorporates defensive deception(DD)strategies to achieve adaptive and efficient protection.While conventional methods typically incur considerable resource overhead and exhibit higher latency due to static or rigid defensive mechanisms,the proposed ZSG-MAD3PG framework mitigates these limitations through multi-stage game modeling and adaptive learning,enabling more efficient resource utilization and faster response times.The Stackelberg-based architecture allows defenders to dynamically optimize packet sampling strategies,while attackers adjust their tactics to reach rapid equilibrium.Furthermore,dynamic deception techniques reduce the time required for the concealment of attacks and the overall system burden.A lightweight behavioral fingerprinting detection mechanism further enhances real-time zero-day attack identification within industrial device clusters.ZSG-MAD3PG demonstrates higher true positive rates(TPR)and lower false alarm rates(FAR)compared to existing methods,while also achieving improved latency,resource efficiency,and stealth adaptability in IIoT zero-day defense scenarios. 展开更多
关键词 Industrial internet of things zero-day attacks Stackelberg game distributed deep deterministic policy gradient defensive spoofing dynamic defense
在线阅读 下载PDF
Effects of nitrate(NO_(3)^(−))stress-induced exacerbated cadmium(Cd^(2+))toxicity on the inflammatory response,oxidative defense,and apoptosis in juvenile Japanese flounder(Paralichthys olivaceus)
9
作者 Jiachen Yu Jie Lian +6 位作者 Yingying Wan Xiangyuan Li Pengfei Liu Qing Ji Suyue Zhou Nianhao Zheng Xingqiang Wang 《Journal of Environmental Sciences》 2025年第6期535-548,共14页
Due to the discharge of industrialwastewater,urban domestic sewage,and intensive marine aquaculture tailwater,nitrate(NO_(3)^(−))pollution has emerged as a significant issue in offshore waters.Nitrate pollution affect... Due to the discharge of industrialwastewater,urban domestic sewage,and intensive marine aquaculture tailwater,nitrate(NO_(3)^(−))pollution has emerged as a significant issue in offshore waters.Nitrate pollution affects aquatic life and may interact with other pollutants,leading to comprehensive toxicity.Cadmium(Cd^(2+))is the most widespread metal contaminant,adversely affecting aquatic life in the coastal waters of China.Despite this,few studies have focused on the synergistic toxicity of NO_(3)^(−)and Cd^(2+)in marine organisms.This study conducted a 30-day exposure experiment on marine Japanese flounder(Paralichthys olivaceus)to explore the synergistic toxicity of NO_(3)^(−)and Cd^(2+).Our results demonstrated that the exposure to Cd^(2+)alone induced slight histopathological changes in the liver.However,malformations such as hepatic vacuolar degeneration and sinusoid dilatationwere exacerbated under co-exposure.Moreover,co-exposure induced the downregulation of antioxidants and the upregulation of the product malonaldehyde(MDA)from lipid peroxidation,indicating potent oxidative stress in the liver.The increased mRNA expression of IL-8,TNF-α,and IL-1β,along with the decreased expression level of TGF-β,indicated a synergistic inflammatory response in the organisms.Furthermore,the co-exposure led to an abnormal expression of P53,caspase-3,caspase-9,Bcl-2,and Bax,and disturbed the apoptosis in the liver through TUNEL staining analysis.Overall,our results imply that co-exposure synergistically affects inflammation,redox status,and apoptosis in flounders.Therefore,the findings from this study provide valuable perspectives on the ecological risk assessment of marine teleosts co-exposure to NO_(3)^(−)and Cd^(2+). 展开更多
关键词 Nitrate pollution Cadmium Japanese flounder Oxidative defense APOPTOSIS
原文传递
Fruits And Challenges of China-Indonesia Security Cooperation Defense cooperation between the two countries provides important support for regional and even global security
10
作者 Yang Danzhi 《China Report ASEAN》 2025年第4期24-25,共2页
In recent years,China and Indonesia have made notable progress in multiple areas of security cooperation,and their collaboration in this respect has continued to deepen under the leadership of both countries.In Novemb... In recent years,China and Indonesia have made notable progress in multiple areas of security cooperation,and their collaboration in this respect has continued to deepen under the leadership of both countries.In November 2024,China and Indonesia issued a joint statement during Indonesian President Prabowo Subianto’s visit to China.It was his first overseas trip after his inauguration.In the statement,the two countries agreed to add security cooperation as the fifth pillar of their partnership,marking an upgrade of bilateral ties. 展开更多
关键词 defense cooperation bilateral ties global security security cooperation Indonesia regional security joint statement
在线阅读 下载PDF
From defense chemistry to agroecological solutions:The evolving role of benzoxazinoids in plants
11
作者 Tao Li Xueqin Liu +6 位作者 Sai Zhang Jialei Lei Ruiqi Li Peipei Ma Jianyu Wu Yufang Xu Huiyong Zhang 《The Crop Journal》 2025年第5期1333-1349,共17页
Benzoxazinoids(BXDs)are a class of plant secondary metabolites that play pivotal roles in plant defense against pathogens and pests,as well as in allelopathy.This review synthesizes recent advances in our understandin... Benzoxazinoids(BXDs)are a class of plant secondary metabolites that play pivotal roles in plant defense against pathogens and pests,as well as in allelopathy.This review synthesizes recent advances in our understanding of the structural and functional diversity of BXDs,the independent evolutionary trajectories of their biosynthetic pathways across different plant species,their metabolic transformations in target organisms,and the opportunities and challenges of optimizing BXD biosynthesis in crops through metabolic engineering.Compared with monocotyledons,dicotyledons employ a more diverse set of enzymes to catalyze the core reactions of BXD biosynthesis.This functional divergence—yet biochemical convergence—between monocotyledons and dicotyledons exemplifies the convergent evolution of BXD biosynthetic pathways in plants.BXDs act not only as potent antifeedants,insecticides,and antimicrobials but also function as signaling molecules that induce callose deposition and activate systemic immunity,thereby enhancing plant resistance to biotic stress.Furthermore,BXDs shape the rhizosphere by modulating microbial communities through species-specific antimicrobial activities and microbial detoxification mechanisms,ultimately exerting allelopathic effects that alter soil chemistry and nutrient dynamics.The translational potential of BXDs is increasingly recognized by synthetic biology approaches,including artificial intelligence-driven enzyme optimization,heterologous pathway engineering,and gene-editing to enhance crop resistance.Despite these promising prospects,challenges remain in balancing metabolic trade-offs and mitigating ecological risks associated with persistent accumulation of BXDs.Future research integrating multi-omics,evolutionary genomics,and microbiome studies will be essential to fully harness BXDs for sustainable crop improvement and reduced reliance on synthetic agrochemicals. 展开更多
关键词 Benzoxazinoids BIOSYNTHESIS Plant defense ALLELOPATHY Metabolic engineering
在线阅读 下载PDF
The Nuclear Option-Could It Work for Planetary Defense?
12
作者 Chris Palmer 《Engineering》 2025年第6期6-8,共3页
In a Nature Physics report published in late September 2024[1],a team of scientists and engineers at Sandia National Laboratories(Albuquerque,NM,USA)described the results of a laboratory experiment showing that a nucl... In a Nature Physics report published in late September 2024[1],a team of scientists and engineers at Sandia National Laboratories(Albuquerque,NM,USA)described the results of a laboratory experiment showing that a nuclear blast could create a burst of X-rays powerful enough to change the path of a large asteroid that might one day be on a collision course with Earth. 展开更多
关键词 large asteroid nature physics report asteroid deflection laboratory experiment planetary defense nuclear blast change path X rays
在线阅读 下载PDF
DSGNN:Dual-Shield Defense for Robust Graph Neural Networks
13
作者 Xiaohan Chen Yuanfang Chen +2 位作者 Gyu Myoung Lee Noel Crespi Pierluigi Siano 《Computers, Materials & Continua》 2025年第10期1733-1750,共18页
Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),t... Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),to enhance structural reasoning,knowledge retrieval,and memory management.The expansion of their application scope imposes higher requirements on the robustness of GNNs.However,as GNNs are applied to more dynamic and heterogeneous environments,they become increasingly vulnerable to real-world perturbations.In particular,graph data frequently encounters joint adversarial perturbations that simultaneously affect both structures and features,which are significantly more challenging than isolated attacks.These disruptions,caused by incomplete data,malicious attacks,or inherent noise,pose substantial threats to the stable and reliable performance of traditional GNN models.To address this issue,this study proposes the Dual-Shield Graph Neural Network(DSGNN),a defense model that simultaneously mitigates structural and feature perturbations.DSGNN utilizes two parallel GNN channels to independently process structural noise and feature noise,and introduces an adaptive fusion mechanism that integrates information from both pathways to generate robust node representations.Theoretical analysis demonstrates that DSGNN achieves a tighter robustness boundary under joint perturbations compared to conventional single-channel methods.Experimental evaluations across Cora,CiteSeer,and Industry datasets show that DSGNN achieves the highest average classification accuracy under various adversarial settings,reaching 81.24%,71.94%,and 81.66%,respectively,outperforming GNNGuard,GCN-Jaccard,GCN-SVD,RGCN,and NoisyGNN.These results underscore the importance of multi-view perturbation decoupling in constructing resilient GNN models for real-world applications. 展开更多
关键词 Graph neural networks adversarial attacks dual-shield defense certified robustness node classification
在线阅读 下载PDF
Key players in plant defense: How scaffold protein GAME15 orchestrates the biosynthesis of steroidal defense metabolite
14
作者 Shengmei Kang Feng Wang 《Advanced Agrochem》 2025年第1期10-12,共3页
GAME15, a scaffold protein, orchestrates the biosynthesis of steroidal glycoalkaloids (a class of compounds with known defensive properties) and steroidal saponins (which contribute to plant defense) in Solanaceae pla... GAME15, a scaffold protein, orchestrates the biosynthesis of steroidal glycoalkaloids (a class of compounds with known defensive properties) and steroidal saponins (which contribute to plant defense) in Solanaceae plants, essential for their defense mechanisms. By assembling key enzymes at the endoplasmic reticulum, GAME15 ensures efficient metabolite production, preventing toxic intermediate diffusion. This breakthrough in plant defense biosynthesis opens opportunities for metabolic engineering, enabling the production of valuable metabolites in non-native hosts and offering potential strategies for crop protection, reducing the need for chemical pesticides. 展开更多
关键词 GAME15 Steroidal glycoalkaloids Steroidal saponins Solanaceae plant Plant defense
在线阅读 下载PDF
Multi-Agent Reinforcement Learning for Moving Target Defense Temporal Decision-Making Approach Based on Stackelberg-FlipIt Games
15
作者 Rongbo Sun Jinlong Fei +1 位作者 Yuefei Zhu Zhongyu Guo 《Computers, Materials & Continua》 2025年第8期3765-3786,共22页
Moving Target Defense(MTD)necessitates scientifically effective decision-making methodologies for defensive technology implementation.While most MTD decision studies focus on accurately identifying optimal strategies,... Moving Target Defense(MTD)necessitates scientifically effective decision-making methodologies for defensive technology implementation.While most MTD decision studies focus on accurately identifying optimal strategies,the issue of optimal defense timing remains underexplored.Current default approaches—periodic or overly frequent MTD triggers—lead to suboptimal trade-offs among system security,performance,and cost.The timing of MTD strategy activation critically impacts both defensive efficacy and operational overhead,yet existing frameworks inadequately address this temporal dimension.To bridge this gap,this paper proposes a Stackelberg-FlipIt game model that formalizes asymmetric cyber conflicts as alternating control over attack surfaces,thereby capturing the dynamic security state evolution of MTD systems.We introduce a belief factor to quantify information asymmetry during adversarial interactions,enhancing the precision of MTD trigger timing.Leveraging this game-theoretic foundation,we employMulti-Agent Reinforcement Learning(MARL)to derive adaptive temporal strategies,optimized via a novel four-dimensional reward function that holistically balances security,performance,cost,and timing.Experimental validation using IP addressmutation against scanning attacks demonstrates stable strategy convergence and accelerated defense response,significantly improving cybersecurity affordability and effectiveness. 展开更多
关键词 Cyber security moving target defense multi-agent reinforcement learning security metrics game theory
在线阅读 下载PDF
The Path of National Awakening From the Perspective of National Defense:A Study of The Eight Hundred
16
作者 HUANG Lei GUO Runlin 《Cultural and Religious Studies》 2025年第11期667-670,共4页
National awakening and the cultivation of national defense consciousness among the populace are deeply interconnected,forming a central narrative theme in Chinese films about the War of Resistance Against Japanese Agg... National awakening and the cultivation of national defense consciousness among the populace are deeply interconnected,forming a central narrative theme in Chinese films about the War of Resistance Against Japanese Aggression.The collective historical memory of the Chinese people’s wartime experience,which embodies the awakening of public defense consciousness,provides a significant historical reference for contemporary national defense development.This paper takes the film The Eight Hundred as a case study,analyzing its dialogues and scenes to trace the process through which national defense consciousness awakens among ordinary people.It concludes that such awakening is an inevitable outcome shaped by moral exemplars and cultural heritage.As an important medium of cultural transmission,War of Resistance-themed films not only construct and perpetuate national defense awareness through historical narratives but also inspire contemporary society to strengthen its defense consciousness through cinematic representation.Furthermore,these films serve as a window for international cross-cultural dialogue.Especially on the 80th anniversary of the victory in the War of Resistance,they showcase to the world the spiritual strength and national resilience of the Chinese people in resisting foreign aggression. 展开更多
关键词 The Eight Hundred national defense consciousness national awakening Chinese War of Resistance films collective memory
在线阅读 下载PDF
Three-body cooperative active defense guidance law with overload constraints:A small speed ratio perspective
17
作者 Shuangxi LIU Zehuai LIN +3 位作者 Yichong WANG Wei HUANG Binbin YAN Yong LI 《Chinese Journal of Aeronautics》 2025年第2期226-243,共18页
In air combat,one effective way to counter an incoming missile attacking an aircraft is to launch a defense missile compared with traditional passive defense strategies such as decoy and electronic countermeasures.To ... In air combat,one effective way to counter an incoming missile attacking an aircraft is to launch a defense missile compared with traditional passive defense strategies such as decoy and electronic countermeasures.To address this issue,this paper proposes a three-body cooperative active defense guidance law with overload constraints from the perspective of a small speed ratio.First,a cooperative guidance-oriented model for active defense is established and linearized to provide a foundation for the design of the guidance law.Then,the essential quantity known as Zero-Effort-Miss(ZEM)is analyzed during the engagement process.In order to minimize the influence of inaccurate estimates of remaining flight time in the ZEM,the concept of Zero-Effort-Velocity(ZEV)is introduced.Subsequently,utilizing the sliding mode control method,the guidance law is designed by selecting the ZEM and ZEV as sliding mode surfaces,combined with the fast power reaching law,and its finite-time stability is analyzed using the Lyapunov method.Furthermore,to quantitatively evaluate the performance of the proposed active defense guidance law,the interception rendezvous angle index is introduced.The proposed active defense guidance law considers integrating information from the incoming missile,aircraft,and defense missile with fewer simplifications and assumptions,and ensures that the aircraft is effectively protected with less overload required for the defense missile.Finally,simulation experiments demonstrate the effectiveness and adaptability of the proposed active defense guidance law. 展开更多
关键词 Three-body active defense Cooperative guidance Guidance law Overload constraint Small speed ratio Sliding mode control
原文传递
Large Prey Growth in the Wolkowicz-Rothe-Shafer Predator-Prey System with Group Defense
18
作者 André ZEGELING LIAO Jin 《数学理论与应用》 2025年第3期1-52,共52页
This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey... This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey growth,the system reduces to a perturbed singular system,whose limit cycles can be analyzed using geometric singular perturbation methods-primarily through the study of a slow-divergence integral.Our work completes partially the results previously obtained by Li and Zhu and by Hsu.We provide a comprehensive classification of all possible singular cycles capable of generating limit cycles and analyze the slow-divergence integral for the nine distinct types of cycle families that arise in a canard explosion.Based on these findings,we demonstrate that the maximum number of limit cycles emerging from the singular cycles is two in all cases,thereby confirming conjectures posed by Rothe-Shafer and Xiao-Ruan. 展开更多
关键词 Predator-prey system Group defense Singular perturbation Limit cycle
在线阅读 下载PDF
A Survey of Adversarial Examples in Computer Vision:Attack,Defense,and Beyond
19
作者 XU Keyizhi LU Yajuan +1 位作者 WANG Zhongyuan LIANG Chao 《Wuhan University Journal of Natural Sciences》 2025年第1期1-20,共20页
Recent years have witnessed the ever-increasing performance of Deep Neural Networks(DNNs)in computer vision tasks.However,researchers have identified a potential vulnerability:carefully crafted adversarial examples ca... Recent years have witnessed the ever-increasing performance of Deep Neural Networks(DNNs)in computer vision tasks.However,researchers have identified a potential vulnerability:carefully crafted adversarial examples can easily mislead DNNs into incorrect behavior via the injection of imperceptible modification to the input data.In this survey,we focus on(1)adversarial attack algorithms to generate adversarial examples,(2)adversarial defense techniques to secure DNNs against adversarial examples,and(3)important problems in the realm of adversarial examples beyond attack and defense,including the theoretical explanations,trade-off issues and benign attacks in adversarial examples.Additionally,we draw a brief comparison between recently published surveys on adversarial examples,and identify the future directions for the research of adversarial examples,such as the generalization of methods and the understanding of transferability,that might be solutions to the open problems in this field. 展开更多
关键词 computer vision adversarial examples adversarial attack adversarial defense
原文传递
An Effective Adversarial Defense Framework:From Robust Feature Perspective
20
作者 Baolin Li Tao Hu +2 位作者 Xinlei Liu Jichao Xie Peng Yi 《Computers, Materials & Continua》 2025年第10期2141-2155,共15页
Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this... Deep neural networks are known to be vulnerable to adversarial attacks.Unfortunately,the underlying mechanisms remain insufficiently understood,leading to empirical defenses that often fail against new attacks.In this paper,we explain adversarial attacks from the perspective of robust features,and propose a novel Generative Adversarial Network(GAN)-based Robust Feature Disentanglement framework(GRFD)for adversarial defense.The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator.For the generator,we introduce a novel Latent Variable Constrained Variational Auto-Encoder(LVCVAE),which enhances the typical beta-VAE with a constrained rectification module to enforce explicit clustering of latent variables.To supervise the disentanglement of robust features,we design a Robust Supervisory Model(RSM)as the discriminator,sharing architectural alignment with the target model.The key innovation of RSM is our proposed Feature Robustness Metric(FRM),which serves as part of the training loss and synthesizes the classification ability of features as well as their resistance to perturbations.Extensive experiments on three benchmark datasets demonstrate the superiority of GRFD:it achieves 93.69%adversarial accuracy on MNIST,77.21%on CIFAR10,and 58.91%on CIFAR100 with minimal degradation in clean accuracy.Codes are available at:(accessed on 23 July 2025). 展开更多
关键词 Adversarial defense robust features DISENTANGLEMENT VAE GAN
在线阅读 下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部